Science Alert
Curve Top
Information Technology Journal
  Year: 2005 | Volume: 4 | Issue: 3 | Page No.: 204-221
DOI: 10.3923/itj.2005.204.221
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Secure Implementation of Message Digest, Authentication and Digital Signature

Kefa Rabah

In this study we present the techniques that are useful in securing the data against tamper in between communicating parties by the man in the middle. This involves the use and implementation of message digest (or hashing), message authentication and digital signature schemes. A hash function can provide message authentication in a most satisfying manner when combined with digital signature algorithm, which does have a key. Digital signatures currently provide Internet applications with data authentication and non-repudiation services and is set to continue playing an important role in future as Internet services continues to grow. Typical digital signature schemes, however, have some performance overhead, which, while acceptable for the periodic setup of communication sessions, is often too large on a message-by-message basis. Thus, the need today is to focus on the message authentication based on shared secrete-key, which is ideally integrated into the hash function in some manner and that’s the subject of this study.
PDF Fulltext XML References Citation Report Citation
  •    Compiler Optimization and Plain Text Pre-Processing to Hoist the Height of HIGHT in AVR Platform
  •    Humming Bird with Coloured Wings: A Feedback Security Approach
  •    Hash Encrypted Synchronized OFDM
  •    Firmware for Data Security: A Review
  •    Robust Text Hashing for Content-Based Document Authentication
How to cite this article:

Kefa Rabah , 2005. Secure Implementation of Message Digest, Authentication and Digital Signature. Information Technology Journal, 4: 204-221.

DOI: 10.3923/itj.2005.204.221






Curve Bottom